General

  • Target

    190a7ad748469f563204bdcebb96118dc586850b9374392b8af14e6c230989d6

  • Size

    126KB

  • Sample

    220417-hwx78sabaj

  • MD5

    c949544a86eaa80a9250f2f08d9c8cd8

  • SHA1

    85523457dd92a5e4955b485c7f0e48b5cbf5d206

  • SHA256

    190a7ad748469f563204bdcebb96118dc586850b9374392b8af14e6c230989d6

  • SHA512

    80549dc29d2b6b9f203a7c3ebf4f08bae9eb47b789b5d402318fab135110f903560b3a5d5d2e5a6a511ed2f67a8f76d63eebfc9d08c6272c22cdc0ad0aa9a0e0

Malware Config

Extracted

Family

icedid

C2

america2020.cyou

Targets

    • Target

      190a7ad748469f563204bdcebb96118dc586850b9374392b8af14e6c230989d6

    • Size

      126KB

    • MD5

      c949544a86eaa80a9250f2f08d9c8cd8

    • SHA1

      85523457dd92a5e4955b485c7f0e48b5cbf5d206

    • SHA256

      190a7ad748469f563204bdcebb96118dc586850b9374392b8af14e6c230989d6

    • SHA512

      80549dc29d2b6b9f203a7c3ebf4f08bae9eb47b789b5d402318fab135110f903560b3a5d5d2e5a6a511ed2f67a8f76d63eebfc9d08c6272c22cdc0ad0aa9a0e0

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • IcedID First Stage Loader

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks